TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Snikket – On the Jabber.ru MitM Attack – Public Jabber/XMPP Service

61 pointsby neustradamusover 1 year ago

3 comments

rodletteover 1 year ago
Nice comprehensive and prompt response!<p><a href="https:&#x2F;&#x2F;www.devever.net&#x2F;~hl&#x2F;xmpp-incident" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.devever.net&#x2F;~hl&#x2F;xmpp-incident</a> advises &quot;Add support for enforcing the presence of CT proofs (known as Signed Certificate Timestamps (SCTs)) in TLS certificates, and enable this support by default.&quot;.<p>Does Snikket do this?
评论 #38001471 未加载
prmoustacheover 1 year ago
One thing this article doesn&#x27;t mention is monitoring your CAA record too. Unless your DNS is hosted and administrated by yourself, which is unlikely if you are using a hosting service for your jabber service, a targeted attack coordinated by a state&#x2F;police could also affect your DNS zone records.<p>Another thing this article doesn&#x27;t mention is given the nature of the protocol, any user should make sure he communicates to recipients using servers who have set a decent level of security standards. That is the hardest part to do.
metadatover 1 year ago
TL;DR: Let&#x27;s Encrypt certificates.. super convenient, right? Convenient for adversaries, too.<p>Key segment of TFA:<p><i>&gt; Specifically, they were decrypting and re-encrypting traffic as it passed through a network device (the “machine in the middle”) that had been placed between the jabber.ru server and the rest of the internet.<p>&gt; Usually TLS prevents such an attack from succeeding, as long as you verify certificates. However in this case the attacker was able to obtain valid certificates for the targeted domains, making all connections look like they were genuine.<p>&gt; With the advent of ACME-based certificate authorities such as Let’s Encrypt, obtaining certificates is not at all hard for someone able to intercept and respond to traffic that is sent to your server, and in this case that’s exactly what happened.</i><p>Edit: I&#x27;m not saying there&#x27;s anything wrong with Let&#x27;s Encrypt. It&#x27;s just interesting how it made things easier in this instance.
评论 #38000284 未加载
评论 #38000954 未加载
评论 #38000149 未加载
评论 #38000194 未加载